Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 02:09
Errors
General
-
Target
AsyncClient.exe
-
Size
47KB
-
MD5
5a1dd7c7ab825fdd25e096f811536bba
-
SHA1
f9d4a166781402ee00baf5ab13b8783041940f2a
-
SHA256
ccbb99114b1f340bdfe220b1696842dea2a704c5b4074648a9005e779a5a3af3
-
SHA512
bca94c03c9455ba34c816fa9ddc05214ac8446a53def82c95160b82a9b976fc2b3a682ec94add7efe1f5976d126f7b8fd479140a3daac87900e98d243ed628ff
-
SSDEEP
768:kujY21TUET1/WUT1V9mo2qz6xAz3cYwsmPIB9+WVGdfz0bkA5UxMbY2sdDinMnBJ:kujY21TU0r24MHwB99VGybkoUxB20Die
Malware Config
Extracted
asyncrat
0.5.8
Default
w-delivery.gl.at.ply.gg:3149
Tqle8mOZFqYB
-
delay
3
-
install
true
-
install_file
i love men.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000023b60-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation AsyncClient.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation i love men.exe -
Executes dropped EXE 1 IoCs
pid Process 3324 i love men.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i love men.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2556 timeout.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 6928 ipconfig.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "218" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4476 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 4436 AsyncClient.exe 3324 i love men.exe 3324 i love men.exe 3324 i love men.exe 3324 i love men.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4436 AsyncClient.exe Token: SeDebugPrivilege 3324 i love men.exe Token: SeDebugPrivilege 3324 i love men.exe Token: SeShutdownPrivilege 7148 shutdown.exe Token: SeRemoteShutdownPrivilege 7148 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5712 LogonUI.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4436 wrote to memory of 2016 4436 AsyncClient.exe 87 PID 4436 wrote to memory of 2016 4436 AsyncClient.exe 87 PID 4436 wrote to memory of 2016 4436 AsyncClient.exe 87 PID 4436 wrote to memory of 3796 4436 AsyncClient.exe 89 PID 4436 wrote to memory of 3796 4436 AsyncClient.exe 89 PID 4436 wrote to memory of 3796 4436 AsyncClient.exe 89 PID 2016 wrote to memory of 4476 2016 cmd.exe 91 PID 2016 wrote to memory of 4476 2016 cmd.exe 91 PID 2016 wrote to memory of 4476 2016 cmd.exe 91 PID 3796 wrote to memory of 2556 3796 cmd.exe 92 PID 3796 wrote to memory of 2556 3796 cmd.exe 92 PID 3796 wrote to memory of 2556 3796 cmd.exe 92 PID 3796 wrote to memory of 3324 3796 cmd.exe 94 PID 3796 wrote to memory of 3324 3796 cmd.exe 94 PID 3796 wrote to memory of 3324 3796 cmd.exe 94 PID 3324 wrote to memory of 6868 3324 i love men.exe 99 PID 3324 wrote to memory of 6868 3324 i love men.exe 99 PID 3324 wrote to memory of 6868 3324 i love men.exe 99 PID 6868 wrote to memory of 6928 6868 cmd.exe 101 PID 6868 wrote to memory of 6928 6868 cmd.exe 101 PID 6868 wrote to memory of 6928 6868 cmd.exe 101 PID 3324 wrote to memory of 7092 3324 i love men.exe 102 PID 3324 wrote to memory of 7092 3324 i love men.exe 102 PID 3324 wrote to memory of 7092 3324 i love men.exe 102 PID 7092 wrote to memory of 7148 7092 cmd.exe 104 PID 7092 wrote to memory of 7148 7092 cmd.exe 104 PID 7092 wrote to memory of 7148 7092 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "i love men" /tr '"C:\Users\Admin\AppData\Roaming\i love men.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "i love men" /tr '"C:\Users\Admin\AppData\Roaming\i love men.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8443.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2556
-
-
C:\Users\Admin\AppData\Roaming\i love men.exe"C:\Users\Admin\AppData\Roaming\i love men.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6868 -
C:\Windows\SysWOW64\ipconfig.exeipconfig5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:6928
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c Shutdown /r /f /t 004⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:7092 -
C:\Windows\SysWOW64\shutdown.exeShutdown /r /f /t 005⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7148
-
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39ae855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154B
MD52ee4e6add042c1b089750099252db34f
SHA1338121cbc52951a04f1f5b80f1f9b00c779e901e
SHA256ca61078c43210bc6d98665cf2d73b63197a0b93d10cbb663bf3fd0373005a4aa
SHA51223220e3750c24bb4761ce8fba4df01e63922d05325f18d1099bcd5e387ddfe4bcf504064f49fac62370efe51556939c07f95540437d829628c7a8b508a6930cc
-
Filesize
47KB
MD55a1dd7c7ab825fdd25e096f811536bba
SHA1f9d4a166781402ee00baf5ab13b8783041940f2a
SHA256ccbb99114b1f340bdfe220b1696842dea2a704c5b4074648a9005e779a5a3af3
SHA512bca94c03c9455ba34c816fa9ddc05214ac8446a53def82c95160b82a9b976fc2b3a682ec94add7efe1f5976d126f7b8fd479140a3daac87900e98d243ed628ff